Obtaining Search Results

How To: Stop Apps from Asking to Track Your iPhone Activity in iOS 14.5 for More Control Over Your Privacy

If you're like me, you're not too keen on being tracked. So when an app asks you if it can track your iPhone activity across other programs and websites for ads or data brokers, the answer is pretty much always "no." If you're tired of choosing "Ask App Not to Track" over and over again, there is a way to stop apps from even being able to ask in the first place.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

How To: Access the Dark Web While Staying Anonymous with Tor

The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your identity and data safe. (Hint: Using Tor is not enough.)

How To: Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System

As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be covering various methods to perform banner grabbing to learn more about the target system.

How To: Hack a website with SQL injection

SQL injection is a type of code injection that takes advantage of security vulnerability at the database level. It's certainly not the easiest form of hacking, but if you're serious about turning a website upside down then this is the way to do it.

How To: Experiment with two-dimensional motion

Motion can be studied in different dimensions. Study of motion of a body in a straight line is called motion in one dimension. A falling body can be called as motion in one dimension. Things can also move sideways when they fall at the same time. This is also called as projectile motion and it is a study of motion in two dimensions. When studying projectile motion we can neglect one dimension of the motion and study the other dimension obtaining the results of motion in that dimension. If a b...

How To: Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning to end can be a bit daunting. I wanted to combine all the steps into a single article and share my experience with everyone. If I have left out any steps please let me know.

How To: Write a Writer's Resume

The resume is an essential tool for getting freelance work assignments. A well written article is not enough when trying to secure a freelance or staff position as a writer. Publishers want to see a resume. It gives the writer an outstanding opportunity to introduce themselves and it gives the editor a general idea of who you are, where you've been, and the work you've completed.

News: Finding Hidden Metadata in Images (Oh, the Possibilities)

Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't mind checking out the metadata in a few of those images. In this article, we'll be going over how to do just that.

News: Mathematical Quilting

I got hooked on origami sometime after Math Craft admin Cory Poole posted instructions for creating modular origami, but I had to take a break to finish a quilt I've been working on for a while now. It's my first quilt, and very simple in its construction (straight up squares, that's about it), but it got me thinking about the simple geometry and how far you could take the design to reflect complex geometries. Below are a few cool examples I found online.

HowTo: Take Photos in the Wild Without Getting Mauled

Robots are great for performing tasks that are otherwise too dangerous for man (e.g. dead body extraction bot). BeetleCam is a cute little bot that takes all the danger out of wild life photography. Controlled remotely from a Range Rover about 50 yards away, BeetleCam ventures where no sane photographer dares to go (at the feet of a charging elephant, say). "We thought that Elephants would be an easy subject for BeetleCam’s first outing. We were wrong… we quickly learned that Elephants are wa...

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

News: Should Kids Be Allowed to Use Facebook and Google+?

It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from collecting personal data from children without parental permission. The Children's Online Privacy Protection Act, or COPPA, as it is more commonly known, has been in effect since 1998, but has not been updated since.

News: Do the Do!

We are embarking upon a new year. As usual, some of us will make "resolutions." There isn't anything wrong with setting goals for the year. It's actually a good idea. It may help focus the energy we bring to life.

Next Page